Unlock instant, AI-driven research and patent intelligence for your innovation.

Network flow anomaly detection method applied to industrial internet and big data platform

A network traffic and anomaly detection technology, applied in the field of big data platforms, can solve problems such as production accidents, terminal equipment not working normally, economic losses, etc.

Active Publication Date: 2020-11-06
CHANGZHOU TIANZHENG IND DEV CO LTD +1
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

DDos attacks can cause many terminal devices to be attacked at the same time, causing these terminal devices to be unable to use normally, causing large-scale production accidents and causing great economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow anomaly detection method applied to industrial internet and big data platform
  • Network flow anomaly detection method applied to industrial internet and big data platform
  • Network flow anomaly detection method applied to industrial internet and big data platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In actual application, the inventor analyzed the distance of distributed denial of service attacks and found that the attack method of distributed denial of service attacks is to send a large amount of useless information to terminal devices within a period of time, which will occupy a large The resources of the terminal equipment make the terminal equipment unusable or paralyzed. Furthermore, the inventor also found that when the terminal device receives a large amount of useless information that needs to be processed, the information flow of the terminal device will change significantly.

[0055] The defects in the solutions in the above prior art are all the results obtained by the inventor after practice and careful research. Therefore, the discovery process of the above problems and the solutions to the above problems proposed by the embodiments of the present invention below , should be the inventor's contribution to the invention during the process of the inventi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a network flow anomaly detection method applied to an industrial internet and a big data platform. The method comprises steps of establishing a flow detectionchannel corresponding to a target terminal device through an authorization instruction; acquiring the real-time network flow of the target terminal equipment through the flow detection channel so as to draw a flow curve; periodically determining a plurality of groups of flow change tracks of the target terminal equipment based on the flow curve, calculating the track offset between the traffic change tracks in different time periods, determining the state parameter of the target terminal equipment in the current time period when the target terminal equipment is judged to be subjected to the distributed denial of service attack according to the track offset, generating a dynamic security strategy according to the state parameter, and issuing the dynamic security strategy to the target terminal equipment. Therefore, the target terminal equipment can determine the abnormal request in the to-be-processed request based on the dynamic security policy and destroy the abnormal request. Therefore, paralysis of the target terminal equipment can be avoided, and safe and reliable operation of the whole industrial Internet control system is ensured.

Description

technical field [0001] This application relates to the technical field of industrial Internet communication security processing, and in particular to a network traffic anomaly detection method and a big data platform applied to the industrial Internet. Background technique [0002] The development of the Industrial Internet has improved the manufacturing industry towards intelligence and digitization, which can greatly improve production efficiency and release artificial labor. With the maturity of edge computing, the distributed industrial control system with cloud-edge-device collaboration is gradually applied in various large-scale production scenarios. Edge computing can realize data processing and analysis on the edge device side, thereby effectively improving the efficiency of data interaction and reducing the delay of data interaction. [0003] In practical applications, in order to ensure the safe and reliable operation of the entire industrial Internet system, it i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1458H04L63/20
Inventor 袁媛
Owner CHANGZHOU TIANZHENG IND DEV CO LTD